First Monday

Uncloaking Terrorist Networks by Valdis E. Krebs

Abstract
This paper looks at mapping covert networks using data available from news sources on the World Wide Web. Specifically, we examine the network surrounding the tragic events of September 11th 2001. Through public data we are able to map a portion of the network centered on the 19 dead hijackers. This map gives us some insight into the terrorist organization, yet it is incomplete. Suggestions for further work and research are offered.

Contents

Introduction and Background
Data Gathering
Prevention or Prosecution?
Conclusion

 

++++++++++

Introduction and Background

We were all shocked by the tragic events of September 11, 2001. In the non-stop stream of news and analysis one phrase was continuously repeated - "terrorist network." Everyone talked about this concept, and described it as amorphous, invisible, resilient, and dispersed. But no one could produce a visual. Being a consultant and researcher in organizational networks, I set out to map this network of terrorist cells that had so affected all of our lives. My aim was to uncover network patterns that would reveal Al Qaeda's preferred methods of stealth organization. If we know what patterns of organization they prefer, we may know what to look for as we search them out in countries across the world.

I soon realized I would be mapping a 'project team', much like the legal, overt groups I had mapped in hundreds of consulting assignments. Both overt and covert project teams have tasks to complete, information to share, funding to obtain and disburse, schedules to meet, and an objectives to accomplish.

My data sources were publicly released information reported in major newspapers such as the New York Times, Wall Street Journal, Washington Post, and the Los Angeles Times. As I monitored the investigation, it was apparent that the investigators would not be releasing all pertinent network/relationship information and actually may be releasing misinformation to fool the enemy. I soon realized that the data was not going to be as complete and accurate as I had grown accustomed to in mapping and measuring organizational networks.

For guidance I turned to previous work by social network theorists who had studied covert, secret, or illegal networks. I found three excellent papers that formed a working foundation for the knowledge I would use to pursue this project. Malcolm Sparrow (Sparrow, 1991) examines the application of social network analysis to criminal activity. Sparrow describes three problems of criminal network analysis that I soon encountered.

  1. Incompleteness - the inevitability of missing nodes and links that the investigators will not uncover.
  2. Fuzzy boundaries - the difficulty in deciding who to include and who not to include.
  3. Dynamic - these networks are not static, they are always changing.

Instead of looking at the presence or absence of a tie between two individuals, Sparrow suggests looking at the waxing and waning strength of a tie depending upon the time and the task at hand.

Wayne Baker and Robert Faulkner (Baker and Faulkner, 1993) suggest looking at archival data to derive relationship data. The data they used to analyze illegal price-fixing networks were mostly court documents and sworn testimony. This data included accounts of observed interpersonal relationships from various witnesses.

Bonnie Erickson (Erickson, 1981) reveals the importance of trusted prior contacts for the effective functioning of a secret society. The 19 hijackers appeared to have come from a network that had formed while they were completing terrorist training in Afghanistan. Many were school chums from many years ago, some had lived together for years, and others were related by kinship ties. Deep trusted ties, that were not easily visible to outsiders, wove this terror network together.

 

++++++++++

Data Gathering

Within one week of the attack, information from the investigation started to become public. We soon knew there were 19 hijackers, which planes they were on, and which nation's passports they had used to get into America. As more information about the hijackers' past was uncovered I decided to map links of three strengths (and corresponding thickness). The tie strength would largely be governed by the amount of time together by a pair of terrorists. Those living together or attending the same school or the same classes/training would have the strongest ties. Those traveling together and participating in meetings together would have ties of moderate strength and medium thickness. Finally, those who were recorded as having a single transaction together, or an occasional meeting, and no other ties, I classified as weak ties that were shown with the thinnest links in the network.

I started my mapping project upon seeing several summaries of data about the hijackers in major newspapers (Sydney Morning Herald, 2001; Washington Post, 2001). These data collections contained information about the nodes/hijackers and their links/relationships. From two to six weeks after the event, it appeared that a new relationship or node was added to the network on a daily basis. Several false stories appeared about a cell in Detroit. These stories, originally reported with great fanfare, were proven false within one week. This made me very cautious about adding a link or a node to the network.

The network was created iteratively as data became available. Everyday I checked the major news sources for updated information. Figure 1 shows my computer screen during this process. The browser window shows the news story, the other window shows the network mapping and measuring software. I would add nodes and links to the map as I read the news accounts. Figure 1 shows a link being added between one of the hijackers and an accomplice.

 

Figure 1

 

By the middle of October enough data was available to start seeing patterns in the hijacker network. Initially, I examined the prior trusted contacts (Erickson, 1981) - those ties formed long ago through living and learning together. The network self-organized (via a network layout algorithm) into the shape of a serpent - how appropriate, I thought.

 

Figure 2

 

I was amazed at how sparse the network was and how distant many of the hijackers on the same team were from each other. Many pairs of team members were beyond the horizon of observability (Friedkin, 1983) from each other - many on the same flight were more than two steps away from each other. A strategy for keeping cell members distant from each other, and from other cells, minimizes damage to the network if a cell member is captured or otherwise compromised. Usama bin Laden even described this plan in his infamous videotape, which was found in Afghanistan. In the transcript (U.S. Department of Defense, 2001) Usama bin Laden mentions:

"Those who were trained to fly didn't know the others. One group of people did not know the other group."

The network metrics for the network in Figure 2 are found in Table 1. For a small network of less than 20 nodes, we see a long average path length of 4.75 steps. Several of the hijackers are separated by more than 6 steps. From this metric and bin Laden's comments above we see that covert networks trade efficiency for secrecy.

 

 

Table 1: Small-World Network Metrics

 
Clustering Coefficient
Average Path Length
Contacts
0.41
4.75
Contacts + Shortcuts
0.42
2.79

 

 

Yet, work has to be done, plans have to be executed. How does a covert network accomplish its goals? Through the judicious use of transitory shortcuts (Watts, 1999) in the network. Meetings were held that connected distant parts of the network to coordinate tasks and report progress. After coordination was accomplished, the cross-ties went dormant. One well documented meeting of the hijacker network took place in Las Vegas. The ties from this and other meetings are shown in gold in Figure 3.

 

Figure 3

 

Six (6) shortcuts were added to the network temporarily in order to collaborate and coordinate. These shortcuts reduced the average path length in the network by over 40% thus improving the information flow in the network - see Table 1. When the network is brought closer together by these shortcuts, all of the pilots ended up in a small clique - the perfect structure to efficiently coordinate tasks and activities. There is a constant dynamic between keeping the network hidden and actively using it to accomplish objectives (Baker and Faulkner, 1993).

The 19 hijackers did not work alone. They had other accomplices that did not get on the planes. These co-conspirators were conduits for money and also provided needed skills and knowledge. Figure 4 shows the hijackers and their network neighborhood - their direct and indirect associates.

 

Figure 4

 

After one month of investigation it was 'common knowledge' that Mohamed Atta was the ring leader of this conspiracy. Again, bin Laden verified Atta's leadership role in the video tape (U.S. Department of Defense, 2001). Looking at the diagram he has the most connections. In Table 2 we see that Atta scores the highest on all network centrality metrics - Degrees, Closeness, and Betweenness (Freeman, 1979). The network metric Degrees reveals Atta's activity in the network. Closeness measures his ability to access others in the network and monitor what is happening. Betweenness shows his control over the flow in the network - he plays the role of a broker in the network. These metrics support his leader status.

 

 

Table 2: Hijacker Network Neighborhood

Degrees
* possible false ID
Betweenness
Closeness
0.361
Mohamed Atta
0.588
Mohamed Atta
0.587
Mohamed Atta
0.295
Marwan Al-Shehhi
0.252
Essid Sami Ben Khemais
0.466
Marwan Al-Shehhi
0.213
Hani Hanjour
0.232
Zacarias Moussaoui
0.445
Hani Hanjour
0.180
Essid Sami Ben Khemais
0.154
Nawaf Alhazmi
0.442
Nawaf Alhazmi
0.180
Nawaf Alhazmi
0.126
Hani Hanjour
0.436
Ramzi Bin al-Shibh
0.164
Ramzi Bin al-Shibh
0.105
Djamal Beghal
0.436
Zacarias Moussaoui
0.164
Ziad Jarrah
0.088
Marwan Al-Shehhi
0.433
Essid Sami Ben Khemais
0.148
Abdul Aziz Al-Omari*
0.050
Satam Suqami
0.424
Abdul Aziz Al-Omari*
0.131
Djamal Beghal
0.048
Ramzi Bin al-Shibh
0.424
Ziad Jarrah
0.131
Fayez Ahmed
0.043
Abu Qatada
0.409
Imad Eddin Barakat Yarkas
0.131
Salem Alhazmi*
0.034
Tarek Maaroufi
0.409
Satam Suqami
0.131
Satam Suqami
0.033
Mamoun Darkazanli
0.407
Fayez Ahmed
0.131
Zacarias Moussaoui
0.029
Imad Eddin Barakat Yarkas
0.404
Lotfi Raissi
0.115
Hamza Alghamdi
0.026
Fayez Ahmed
0.401
Wail Alshehri
0.115
Said Bahaji
0.023
Abdul Aziz Al-Omari*
0.399
Ahmed Al Haznawi
0.098
Khalid Al-Mihdhar
0.022
Hamza Alghamdi
0.399
Said Bahaji
0.098
Saeed Alghamdi*
0.017
Ziad Jarrah
0.391
Agus Budiman
0.098
Tarek Maaroufi
0.015
Ahmed Al Haznawi
0.391
Zakariya Essabar
0.098
Wail Alshehri
0.013
Salem Alhazmi*
0.389
Mamoun Darkazanli
0.098
Wail Alshehri
0.013
Salem Alhazmi*
0.389
Mamoun Darkazanli
0.098
Waleed Alshehri
0.012
Lotfi Raissi
0.389
Mounir El Motassadeq
0.082
Abu Qatada
0.012
Saeed Alghamdi*
0.389
Mustafa Ahmed al-Hisawi
0.082
Agus Budiman
0.011
Agus Budiman
0.372
Abdelghani Mzoudi
0.082
Ahmed Alghamdi
0.007
Ahmed Alghamdi
0.372
Ahmed Khalil Al-Ani
0.082
Lotfi Raissi
0.007
Ahmed Ressam
0.365
Salem Alhazmi*
0.082
Zakariya Essabar
0.007
Haydar Abu Doha
0.361
Hamza Alghamdi
0.066
Ahmed Al Haznawi
0.006
Kamel Daoudi
0.343
Abu Qatada
0.066
Imad Eddin Barakat Yarkas
0.006
Khalid Al-Mihdhar
0.343
Tarek Maaroufi
0.066
Jerome Courtaillier
0.004
Mohamed Bensakhria
0.339
Ahmed Alghamdi
0.066
Kamel Daoudi
0.003
Nabil al-Marabh
0.335
Waleed Alshehri
0.066
Majed Moqed
0.002
Jerome Courtaillier
0.332
Djamal Beghal
0.066
Mamoun Darkazanli
0.002
Mustafa Ahmed al-Hisawi
0.332
Khalid Al-Mihdhar
0.066
Mohamed Bensakhria
0.002
Said Bahaji
0.332
Saeed Alghamdi*
0.066
Mounir El Motassadeq
0.002
Wail Alshehri
0.328
Majed Moqed
0.066
Mustafa Ahmed al-Hisawi
0.001
Abu Walid
0.324
Ahmed Ressam
0.066
Nabil al-Marabh
0.001
Mehdi Khammoun
0.323
Ahmed Alnami
0.066
Rayed Mohammed Abdullah
0.001
Mohand Alshehri*
0.323
Nabil al-Marabh
0.049
Abdussattar Shaikh
0.001
Raed Hijazi
0.321
Haydar Abu Doha
0.049
Abu Walid
0.001
Rayed Mohammed Abdullah
0.319
Mohamed Bensakhria
0.049
Ahmed Alnami
0.001
Waleed Alshehri
0.316
Essoussi Laaroussi
0.049
Haydar Abu Doha
0.000
Abdelghani Mzoudi
0.316
Jerome Courtaillier
0.049
Mehdi Khammoun
0.000
Abdussattar Shaikh
0.316
Kamel Daoudi
0.049
Osama Awadallah
0.000
Abu Zubeida
0.316
Seifallah ben Hassine
0.049
Raed Hijazi
0.000
Ahmed Alnami
0.314
Rayed Mohammed Abdullah
0.033
Ahmed Ressam
0.000
Ahmed Khalil Al-Ani
0.313
Raed Hijazi
0.033
Bandar Alhazmi
0.000
Bandar Alhazmi
0.311
Abdussattar Shaikh
0.033
David Courtaillier
0.000
David Courtaillier
0.311
Bandar Alhazmi
0.033
Essoussi Laaroussi
0.000
Essoussi Laaroussi
0.311
Faisal Al Salmi
0.033
Faisal Al Salmi
0.000
Faisal Al Salmi
0.311
Mohand Alshehri*
0.033
Lased Ben Heni
0.000
Faisal Al Salmi
0.311
Osama Awadallah
0.033
Mohammed Belfas
0.000
Jean-Marc Grandvisir
0.308
Mehdi Khammoun
0.033
Mohand Alshehri*
0.000
Lased Ben Heni
0.308
Mohamed Abdi
0.033
Seifallah ben Hassine
0.000
Madjid Sahoune
0.307
David Courtaillier
0.016
Abdelghani Mzoudi
0.000
Majed Moqed
0.307
Mohammed Belfas
0.016
Abu Zubeida
0.000
Mamduh Mahmud Salim
0.305
Lased Ben Heni
0.016
Ahmed Khalil Al-Ani
0.000
Mohamed Abdi
0.303
Fahid al Shakri
0.016
Fahid al Shakri
0.000
Mohammed Belfas
0.303
Madjid Sahoune
0.016
Jean-Marc Grandvisir
0.000
Mounir El Motassadeq
0.303
Samir Kishk
0.016
Madjid Sahoune
0.000
Nizar Trabelsi
0.281
Mamduh Mahmud Salim
0.016
Mamduh Mahmud Salim
0.000
Osama Awadallah
0.264
Abu Walid
0.016
Mohamed Abdi
0.000
Samir Kishk
0.250
Abu Zubeida
0.016
Nizar Trabelsi
0.000
Seifallah ben Hassine
0.250
Jean-Marc Grandvisir
0.016
Samir Kishk
0.000
Zakariya Essabar
0.250
Nizar Trabelsi
           
0.081
Average
0.032
Average
0.052
Average
0.289
Centralization
0.565
Centralization
0.482
Centralization

 

Yet, we are obviously missing nodes and ties in this network. Centrality measures are very sensitive to minor changes in network connectivity. A discovery of a new conspirator or two, or the uncovering of new ties amongst existing nodes can alter who comes out on top in the centrality measures. We must be wary of incomplete data.

++++++++++

Prevention or Prosecution?

Currently, social network analysis (SNA) is applied more successfully to the prosecution, not the prevention, of criminal activities. SNA has a long history of application to evidence mapping in both fraud and criminal conspiracy cases.

As was evident with the September 11th hijackers, once the investigators knew whom to look at, they quickly found the connections amongst the hijackers and also discovered several of the hijackers' associates. We must be careful of 'guilt by association'. Being linked to a terrorist does not prove guilt - but it does invite investigation.

The big question remains - why wasn't this attack predicted and prevented? Everyone expects the intelligence community to uncover these covert plots and stop them before they are executed. Occasionally plots are uncovered and criminal networks are disrupted. But this is very difficult to do. How do you discover a network that focuses on secrecy and stealth?

Covert networks often don't behave like normal social networks (Baker and Faulkner, 1993). Conspirators don't form many ties outside of their immediate cluster and often minimize the activation of existing ties inside the network. Strong ties between prior contacts, which were frequently formed years ago in school and training camps, keep the cells linked. Yet, unlike normal social networks, these strong ties remain mostly dormant and therefore hidden to outsiders.

In a normal social network, strong ties reveal the cluster of network players - it is easy to see who is in the group and who is not. In a covert network, because of their low frequency of activation, strong ties may appear to be weak ties. The less active the network, the more difficult it is to discover. Yet, the covert network has a goal to accomplish. Network members must balance the need for secrecy and stealth with the need for frequent and intense task-based communication (Baker and Faulkner 1993). The covert network must be active at times - it has goals to accomplish. It is during these periods of activity, and increased connectedness, that they may be most vulnerable to discovery.

Ties between members of the hijacker network and outsiders were non-existent. It was often reported that the hijackers kept to themselves - they did not make friends outside the trusted circle. They would rarely interact with others, and then often one of them would speak for the whole group. Eliminating boundary-spanning ties reduces the visibility into the network, and chance of leaks out of the network.

The hijacker's network had a hidden strength - massive redundancy through trusted prior contacts. These ties made the network very resilient. These ties were solidly in place as the hijackers made their way to America. These strong ties were rarely active - they were mostly invisible during their stay in America. It was only after the tragic event that intelligence from Germany and other countries, revealed the apparent center of this violent network. The dense connections of the 'Hamburg cell' are now obvious in Figure 4.

This dense under-layer of prior trusted relationships made the hijacker network both stealth and resilient. Although we do not know all of the internal ties of the hijackers' network it appears that many of the ties were concentrated around the pilots. This is a risky move for a covert network. Concentrating both unique skills and connectivity in the same nodes makes the network easier to disrupt - once it is discovered. Peter Klerks (Klerks, 2001) makes an excellent argument for targeting those nodes in the network that have unique skills. By removing those necessary skills from the project, we can inflict maximum damage to the project mission and goals. It is possible that those with unique skills would also have unique ties within the network. Because of their unique human capital and their high social capital the pilots were the richest targets for removal from the network. Unfortunately they were not discovered in time.

 

++++++++++

Conclusion

To draw an accurate picture of a covert network, we need to identify task and trust ties between the conspirators. The same four relationships we often map in many business organizations would tell us much about illegal organizations. This data is occasionally difficult to unearth with cooperating clients. With covert criminals, the task is enormous, and may be impossible to complete. Table 3 below lists multiple project networks and possible data sources about covert collaborators.

 

Table 3: Networks to Map

Relationship/Network
Data Sources
1. Trust
Prior contacts in family, neighborhood, school, military, club or organization. Public and court records. Data may only be available in suspect's native country.
2. Task
Logs and records of phone calls, electronic mail, chat rooms, instant messages, Web site visits. Travel records. Human intelligence: observation of meetings and attendance at common events.
3. Money & Resources
Bank account and money transfer records. Pattern and location of credit card use. Prior court records. Human intelligence: observation of visits to alternate banking resources such as Hawala.
4. Strategy & Goals
Web sites. Videos and encrypted disks delivered by courier. Travel records. Human intelligence: observation of meetings and attendance at common events.

 

Of course, the common network researcher will not have access to many of these sources. The researcher's best sources may be public court proceedings, which contain much of this data (Baker and Faulkner, 1993; U.S. Department of Justice, 2001).

The best solution for network disruption may be to discover possible suspects and then, via snowball sampling, map their individual personal networks - see whom else they lead to, and where they overlap. To find these suspects it appears that the best method is for diverse intelligence agencies to aggregate their individual information into a larger emergent map. By sharing information and knowledge, a more complete picture of possible danger can be drawn. In my data search I came across many news accounts where one agency, or country, had data that another would have found very useful. To win this fight against terrorism it appears that the good guys have to build a better information and knowledge sharing network than the bad guys (Ronfeldt and Arquilla, 2001). End of article

 

About the Author

Valdis Krebs leads his own firm, orgnet.com, which provides social network analysis software and services to the consulting community. He has been mapping and measuring human networks within and between organizations since 1988. He is also involved in the following research: networks in adaptive organizations, industry clusters/ecosystems, and network vulnerability.
E-mail: valdis@orgnet.com

 

Acknowledgments

An earlier version of this paper was originally published in volume 24, number 3 (2001) of Connections, the official journal of the International Network for Social Network Analysis and appears here with the kind permission of Connections and the International Network for Social Network Analysis. Copyright © 2001, INSNA and Valdis E. Krebs.

 

References

Wayne E. Baker and Robert R. Faulkner, 1993. "The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry," American Sociological Review, volume 58, number 6 (December), pp. 837-860.

Bonnie H. Erickson, 1981. "Secret Societies and Social Structure," Social Forces, volume 60, number 1 (September), pp. 188-210.

Linton C. Freeman, 1979. "Centrality in Social Networks: Conceptual Clarification," Social Networks, volume 1, pp. 215-239.

Noah E. Friedkin, 1983. "Horizons of Observability and Limits of Informal Control in Organizations," Social Forces, volume 62, pp. 54-77.

Peter Klerks, 2001. "The network paradigm applied to criminal organizations," Connections, volume 24, number 3, pp. 53-65.

Valdis E. Krebs, 2001. "Network Metrics." InFlow 3.0 Users' Manual.

Valdis E. Krebs, 1996. "Visualizing Human Networks," Release 1.0 (February), pp. 1-25.

David Ronfeldt and John Arquilla. 2001. "Networks, Netwars, and the Fight for the Future," First Monday, volume 6, number 10 (October), at http://firstmonday.org/issues/issue6_10/ronfeldt/, accessed 25 March 2002.

Tom Stewart, 2001. "Six Degrees of Mohamed Atta," Business 2.0 (December), p. 63, and at http://www.business2.com/articles/mag/0,1640,35253,FF.html, accessed 25 March 2002.

Malcolm K. Sparrow, 1991. "The application of network analysis to criminal intelligence: An assessment of the prospects," Social Networks, volume 13, pp. 251-274.

Sydney Morning Herald, 2001. "The hijackers ... and how they were connected," (22 September), at http://www.smh.com.au/.

U.S. Department of Defense. 2001. "Transcript of bin Laden Video Tape," (13 December), at http://www.defenselink.mil/news/Dec2001/d20011213ubl.pdf, accessed 25 March 2002.

U.S. Department of Justice, 2001. "Indictment of Zacarias Moussaoui," (11 December), at http://www.usdoj.gov/ag/moussaouiindictment.htm, accessed 25 March 2002.

Washington Post, 2001. "The Plot: A Web of Connections," (24 September), at http://www.washingtonpost.com/wp-srv/nation/graphics/attack/investigation_24.html, accessed 25 March 2002.

Duncan J. Watts, 1999. "Networks, Dynamics, and the Small-World Phenomenon," American Journal of Sociology, volume 13, number 2, pp. 493-527.


Editorial history

Paper received 20 March 2002; accepted 25 March 2002.


Contents Index

Copyright ©2002, First Monday

Uncloaking Terrorist Networks by Valdis E. Krebs
First Monday, volume 7, number 4 (April 2002),
URL: http://firstmonday.org/issues/issue7_4/krebs/index.html